This application claims priority from Japanese Patent Application No. 2023-073437 filed on Apr. 27, 2023 and Japanese Patent Application No. 2024-006772 filed on Jan. 19, 2024. The entire content of the priority application is incorporated herein by reference.
In a related art, there has been a scan system including an information processing device, a server device, and an image processing device having a scan function, in which the information processing device includes an application and a scanner driver, and uses a TWAIN driver as the scanner driver. In the related art, it is also disclosed that a so-called pull scan is performed.
In the related art, the TWAIN driver, which is a general-purpose driver application (scanner driver), is stored in a storage of a terminal device. The TWAIN driver has a mode in which a user interface of the TWAIN driver is used and a NonUI mode in which another user interface other than the user interface of the TWAIN driver is used.
Here, when a pull scan is performed from the terminal device side, to prevent acquisition of a read image of another user who is not an original user who sets an object to be read in a reading device and to ensure security, it is necessary to authenticate a user name or the like on the reading device side in response to access from the terminal device.
In this case, in a mode using the user interface of the TWAIN driver, it is sufficient to input the user name and the like to the user interface of the TWAIN driver, but the technique cannot be used in the NonUI mode. In the above technique in the related art, no particular consideration is given to such a point, and when the user interface of the general-purpose driver application is not used in the terminal device, it is difficult to execute a pull scan while ensuring security.
An object of the present disclosure is to provide a reading system and a non-transitory computer readable storage medium storing a reading processing program capable of executing a pull scan while ensuring security even in a case where a user interface of a general-purpose driver application is not used in a terminal device.
A reading system including: a terminal device including a first controller and a storage; and a reading device including a second controller, the reading device being connected to the terminal device and configured to read an object to be read, in which the storage is configured to store a first program, a second program, and a third program, the first program being an application program corresponding to the reading device, the second program being a general-purpose driver application called from the first program, the third program being a predetermined application program different from the first program and the second program, the second program includes: a first mode in which a user interface of the second program is used; and a second mode in which an other user interface that is not the user interface of the second program is used, the first controller is configured to execute: by the third program, reception processing of receiving an input of user authentication information; information creation processing of creating information to be authenticated for authentication in the reading device, using the user authentication information received by the third program in the reception processing; and by the second program, first command transmission processing of transmitting a scan execution command together with the information to be authenticated, and the second controller is configured to execute: first command reception processing of receiving the transmitted information to be authenticated and scan execution command; and scan-related processing of performing processing related to a scan, in accordance with the received information to be authenticated.
A non-transitory computer readable storage medium storing a reading processing program executed by a calculation unit of a terminal device, in which the terminal device is connected to a reading device configured to read an object to be read, and the terminal device including the calculation unit and a storage, the storage includes a first program, a second program, and a third program, the first program being an application program corresponding to the reading device, the second program being a general-purpose driver application called from the first program, and the third program being a predetermined application program different from the first program and the second program, and the second program includes: a first mode in which a user interface of the second program is used; and a second mode in which another user interface that is not the user interface of the second program is used, and the reading processing program including instructions, when executed by the calculation unit, causing the calculation unit to execute: a reception procedure of receiving an input of user authentication information; and an information creation procedure of creating information to be authenticated for authentication in the reading device, using the user authentication information received in the reception procedure.
Next, a reading system according to an embodiment of the present disclosure will be described with reference to the drawings.
The PC 10 includes, for example, a main body 11 including a CPU serving as a first controller and a storage including a storage medium such as a large-capacity hard disk drive, a ROM, and a RAM, a display screen 12, and a keyboard 13 and a mouse 14 serving as an operation unit. Therefore, in the following description, processing executed by the first controller and the storage is simply described as being executed by the PC 10.
As the PC 10 as the terminal device, in addition to the desktop personal computer described above, a notebook personal computer or a terminal device having a computer function such as a tablet terminal (including a smartphone or the like) can be applied in general.
The reading device 20 includes a reading surface 21 made of transparent glass or the like on which a medium to be read is placed. The reading device 20 further includes a CPU serving as a second controller, a reading unit for reading an image, and a storage made of a storage medium such as a hard disk drive, a ROM, and a RAM storing an application for executing reading, by the CPU, including temporary storage of image data of an image read by the reading unit and drive control over the reading unit. Therefore, in the following description, processing executed by the second controller and the storage is simply described as being executed by the reading device 20.
The reading device 20 is connected to the PC 10 in a wired or wireless manner. The reading device 20 is at least configured to execute a pull scan in which the user P operates the PC 10 to cause the reading device 20 to read a medium to be read. The reading device may be configured to, in combination with the pull scan, execute a push scan in which image data read by the user P operating the reading device 20 is transmitted to the PC 10, another personal computer, or a storage medium (for example, an SD card).
Here, the storage of the PC 10 according to the present embodiment is configured to store a first program (hereinafter, also simply referred to as “scan app”) that is an application program corresponding to the reading device 20, a second program (hereinafter, also simply referred to as “TWAIN” or “TWAIN driver”) that is a general-purpose driver application called from the first program, and a third program (hereinafter, also simply referred to as “predetermined app”) that is a predetermined application program different from the first program and the second program.
The CPU serving as the first controller of the PC 10 is configured to execute a first mode (hereinafter, also referred to as a “UI mode”) in which a user interface of the TWAIN driver is used, and a second mode (hereinafter, also referred to as a “NonUI mode”) in which another user interface that is not the user interface of the TWAIN driver is used.
The display screen 12 of the PC 10 is configured to display, for example, an icon for activating and selecting the predetermined app and an icon for activating and selecting the TWAIN driver, in a case where an operating system is started. Accordingly, the user P can execute each reading mode (UI mode, NonUI mode, or the like) by clicking and selecting an icon with a mouse operation.
Next, processing procedures of the PC 10 and the reading device 20 as an example of use of the reading system according to the present embodiment will be described. In
The predetermined app according to the present embodiment may include an operating system. Accordingly, in a case where the PC 10 is started up, the user inputs a user name (=identification information on the user, hereinafter, also simply referred to as “ID”) and a password for identifying authority, for example, whether to start up as an administrator or a general user when signing in, and the user name and the password can be received, and the user name and the password can be stored in the storage of the PC 10. The user name and the password are examples of user authentication information. Alternatively, in the predetermined app according to the present embodiment, for example, in a case where a dedicated scan management application or the like is used and, for example, an icon corresponding to the scan management application is clicked (or tapped), an input screen for inputting a user name (ID) and a password as shown in
Therefore, “the user inputs the user name and the password” using various predetermined apps corresponds to “(1) start up tool and input user authentication information” shown in
That is, the first controller of the PC 10 is configured to execute, by the third program (predetermined app), reception processing of receiving an input of a user name and a password and, by the third program (predetermined app), storage processing of storing the received user authentication information in a registry.
Next, after placing the medium on the reading surface 21 of the reading device 20, the user P clicks (or taps), for example, an icon for activating and selecting the TWAIN driver, activates a scan screen (TWAIN driver) as shown in
That is, the first controller of the PC 10 is configured to start the scan mode as “operate “execute scanning”” shown in
Next, the first controller of the PC 10 is configured to acquire the user name and the password from the storage, and then creates, for example, information to be authenticated in which the user name and the password are encrypted or the information to be authenticated which is associated with the user name and the password and is registered in advance in relation to reading authority (reading restriction) related to use of the reading device 20. Further, the first controller of the PC 10 is configured to generate a command in which the information to be authenticated is added to the read information corresponding to various read conditions such as resolution and color setting shown in
Therefore, “acquire the user name and the password from the storage” described above corresponds to “(5) acquire user authentication information” shown in
That is, the first controller of the PC 10 is configured to execute acquisition processing of reading and acquiring the user name and the password stored in the registry by the second program (TWAIN), information creation processing of creating information to be authenticated for authentication in the reading device 20 using the acquired user name and the password by the third program (predetermined app), and first command transmission processing of transmitting a scan execution command together with the information to be authenticated created by the second program (TWAIN).
In contrast, in a case where the command with the information to be authenticated (scan execution command) is transmitted from the PC 10, and the second controller of the reading device 20 receives the command, the second controller of the reading device 20 compares the command with authentication information related to a scan use mode or the like of the user stored in advance in the storage of the reading device 20 and makes an authentication determination as to whether reading may be executed. Then, in a case where a determination result is successful, the second controller reads the medium and temporarily stores the medium, and for example, after generating image data for the read image of each medium in a predetermined image format (for example, GIF or JPG), the image data is transmitted to the PC 10.
Therefore, “receive the command (scan execution command)” described above corresponds to “(8) receive” shown in
That is, the second controller of the reading device 20 is configured to execute first command reception processing of receiving the transmitted information to be authenticated and scan execution command, and scan-related processing of performing processing related to a scan according to the received information to be authenticated.
“Read the medium to be read and temporarily store the medium to be read” by the second controller of the reading device 20 corresponds to “(10) read” shown in
Accordingly, the first controller of the PC 10 is configured to receive the image data read by the reading device 20 using the second program (TWAIN driver), store the image data, for example, in the storage of the PC 10 or another portable storage medium (SD card memory, USB memory, or the like), display the image data on the display screen 12, and use the image data for image editing work using an image editing app or the like.
Therefore, “receive image data” described above corresponds to “(12) receive” shown in
That is, the first controller of the PC 10 is configured to execute first read image reception processing of receiving the transmitted read image.
Thus, in the reading system according to the present embodiment, the second program (TWAIN driver), which is a general-purpose driver application, is stored in the storage of the PC 10. The second program (TWAIN driver) has a first mode in which the user interface of the second program (TWAIN driver) is used, and a second mode in which another user interface other than the user interface of the second program (TWAIN driver) is used.
Here, the first controller of the PC 10 uses the third program to execute the reception processing and the storage processing of the user name (ID) and the password in advance before executing scanning.
The first controller of the PC 10 is configured to receive the input of the user name and the password by the third program in the reception processing, and is configured to store the user name and the password received in the reception processing in the registry by the third program in the storage processing. Accordingly, the second program (TWAIN driver) is configured to read and acquire the user name and password stored in the registry in the acquisition processing.
Thereafter, to cause the reading device 20 to perform the above-described authentication, the PC 10 uses the acquired user name and password to create the information to be authenticated by the third program in the information creation processing. The information to be authenticated may be created using the first program or the second program instead of the third program. Then, the second program (TWAIN driver) transmits the created information to be authenticated and the scan execution command in the first command transmission processing.
Accordingly, after receiving the transmitted information to be authenticated and scan execution command in the first command reception processing, the second controller of the reading device 20 can perform authentication according to the information to be authenticated. In a case where the authentication is successful, a read image of the object to be read is transmitted to the PC 10 in the first image transmission processing.
As a result, even in a case where a user interface of a general-purpose driver application is not used in the PC 10, it is possible to smoothly execute the pull scan while ensuring security.
As shown in
In this case as well, a similar effect as described above can be obtained.
In the first embodiment, the PC 10 is configured to acquire necessary user authentication information by the third program (predetermined app) before executing an actual scan (read), and uses the information to be authenticated based on the user authentication information for authentication in the reading device 20.
In contrast, there may be a case where the user does not know that authentication based on the user authentication information as described above is required.
For example, in a case where the reading device 20 is used, it is considered that, for example, a driver (for example, the TWAIN driver=the second program) corresponding to models of all manufacturers that execute scanning with contents of the display screen shown in
In this case, in a case where the user operates scan execution using the TWAIN driver ((21) operate “execute scanning” from the app shown in
In this case, even in a case where the second controller of the reading device 20 receives the received command ((24) receive shown in
Therefore, the second controller of the reading device 20 transmits an authentication error notification to the PC 10 to request a command including authentication information ((25) transmit authentication error notification shown in
Accordingly, in a case where the authentication error notification is received ((26) receive shown in
Therefore, the first controller of the PC 10 is configured to store the user authentication information acquired here, and thereafter can execute the processing of “(5) acquire user authentication information”, “(6) create information to be authenticated”, and “(7) transmit command with information to be authenticated added” in a similar manner as described above by skipping (4) operate “execute scanning” from the processing procedure shown in
As described above, the first controller of the PC 10 is configured to execute, by the second program (TWAIN), reference processing (processing (22)) of referring to the user name and the password stored in the registry, and the second command transmission processing (processing (23)) of transmitting a scan execution command by the second program (TWAIN) in a case where the user name and the password in the registry cannot be identified in the reference processing.
Then, the second controller of the reading device 20 is configured to execute second command reception processing (processing (24)) of receiving the transmitted scan execution command, and notification transmission processing (processing (25)) of transmitting an authentication error notification in accordance with the received scan execution command.
In response to this, the first controller of the PC 10 is configured to execute, by the second program (TWAIN), notification reception processing (processing (26)) of receiving the transmitted authentication error notification, and in response to the received authentication error notification, starts the third program (predetermined app), and executes, by the third program (predetermined app), display processing (processing (27)) of displaying an input screen for inputting the user name and the password on the display 12.
Accordingly, the first controller of the PC 10 is configured to execute the above processing after receiving the input of the user name and the password via the input screen displayed on the display 12 in the reception processing.
In a case where the user name and the password are cached in the storage of the PC 10, that is, in a case where the reading operation is performed again in a state where a reading operation is performed once based on the input of the user name (ID) and the password and the user name (ID) and the password are stored in the storage that is the registry, or in a case where the reading operation is performed again by performing an application operation different from the reading operation, a re-input of the user name (ID) and the password is not required unless the PC 10 is logged off (powered off).
In this case, in a case where the user operates the scan execution using the TWAIN driver ((21) operate shown in
Further, in the flow of the above processing according to a second embodiment, the order of “(9) authenticate” and “(10) read” may be reversed as described above with reference to
In the above description, the flowcharts shown in
While the invention has been described in conjunction with various example structures outlined above and illustrated in the figures, various alternatives, modifications, variations, improvements, and/or substantial equivalents, whether known or that may be presently unforeseen, may become apparent to those having at least ordinary skill in the art. Accordingly, the example embodiments of the disclosure, as set forth above, are intended to be illustrative of the invention, and not limiting the invention. Various changes may be made without departing from the spirit and scope of the disclosure. Therefore, the disclosure is intended to embrace all known or later developed alternatives, modifications, variations, improvements, and/or substantial equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2023-073437 | Apr 2023 | JP | national |
2024-006772 | Jan 2024 | JP | national |